• Title/Summary/Keyword: RFID 인증 시스템

Search Result 232, Processing Time 0.026 seconds

A Study on certification plan on Radio Frequency Identification for Airplane Use (항공산업에 활용되는 무선인식 기반 시스템 인증 방안)

  • Han, Sang-Ho
    • Aerospace Engineering and Technology
    • /
    • v.7 no.1
    • /
    • pp.236-244
    • /
    • 2008
  • The evolution and application of RFID technologies have been at the forefront of allowing aviation industries to improve the quality of aircraft maintenance and air cargo handling. However, safety problems in airplane operation are arising from the hazards of frequencies transmitted due to RFID systems. Though the intensities of frequencies back-scattered from the tags are very weak, some malfunctions are anticipated due to induction coupling on aircraft wiring. Therefore, safety assessment such as electromagnetic compatability should be accomplished upon aircraft critical and essential equipments before installations.

  • PDF

Secure Mutual Authentication Protocol for RFID System without Online Back-End-Database (온라인 백-엔드-데이터베이스가 없는 안전한 RFID 상호 인증 프로토콜)

  • Won, Tae-Youn;Yu, Young-Jun;Chun, Ji-Young;Byun, Jin-Wook;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.63-72
    • /
    • 2010
  • RFID is one of useful identification technology in ubiquitous environments which can be a replacement of bar code. RFID is basically consisted of tag, reader, which is for perception of the tag, and back-end-database for saving the information of tags. Although the usage of mobile readers in cellular phone or PDA increases, related studies are not enough to be secure for practical environments. There are many factors for using mobile leaders, instead of static leaders. In mobile reader environments, before constructing the secure protocol, we must consider these problems: 1) easy to lose the mobile reader 2) hard to keep the connection with back-end-database because of communication obstacle, the limitation of communication range, and so on. To find the solution against those problems, Han et al. suggest RFID mutual authentication protocol without back-end-database environment. However Han et al.'s protocol is able to be traced tag location by using eavesdropping, spoofing, and replay attack. Passive tag based on low cost is required lots of communication unsuitably. Hence, we analyze some vulnerabilities of Han et al.'s protocol and suggest RFID mutual authentication protocol without online back-end-database in aspect of efficiency and security.

The Etrance Authentication Systems Using Real-Time Object Extraction and the RFID Tag (얼굴 인식과 RFID를 이용한 실시간 객체 추적 및 인증 시스템)

  • Jung, Young Hoon;Lee, Chang Soo;Lee, Kwang Hyung;Jun, Moon Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.4
    • /
    • pp.51-62
    • /
    • 2008
  • In this paper, the proposal system can achieve the more safety of RFID System with the 2-step authentication procedures for the enhancement about the security of general RFID systems. After authentication RFID Tag, additionally, the proposal system extract the characteristic information in the user image for acquisition of the additional authentication information of the user with the camera. In this paper, the system which was proposed more enforce the security of the automatic entrance and exit authentication system with the cognitive characters of RFID Tag and the extracted characteristic information of the user image through the camera. The RFID system which use the active tag and reader with 2.4GHz bandwidth can recognize the tag of RFID in the various output manner. Additionally, when the RFID system have errors, the characteristic information of the user image is designed to replace the RFID system as it compare with the similarity of the color, outline and input image information which was recorded to the database previously. In the result of experiment, the system can acquire more exact results as compared with the single authentication system when it using RFID Tag and the information of color characteristics.

A Multi-Agent Scheme Considering User's Mobility RFID based on Knowledge Management System (사용자의 이동성을 고려한 멀티 에이전트 방식의 RFID 기반 지식 관리 시스템)

  • Seo, Dae-Hee;Baek, Jang-Mi;Cho, Dong-Sub
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.2
    • /
    • pp.99-108
    • /
    • 2010
  • The Wireless Ad Hoc network is discussed as a core technology for ubiquitous computing, and the smart tag technology is currently being actively discussed as a part of the sensor network. Thus, considering its security may advance the realization of ubiquitous computing. RFID (Radio Frequency Identification) technology using the smart tag technology as a part of the sensor network is currently in the limelight. In particular, when RFID is applied to a knowledge management system managing various data, data mobility and management convenience are ensured and automated knowledge service can be provided to users. Accordingly, this paper to proposed a secure scheme for mobility knowledge management systems using multi-agents differentiated from the existing knowledge management systems. Specifically, the proposed scheme designates user's authentication and privilege information in multi-agents and provides effective knowledge service through grouping based on user information. Moreover, even user's movement, the proposed scheme ensures service availability and provides continuous information through communication with multi-agent systems.

Analysis about EPC Class 1 and C1G2 Security (EPC Class1과 C1G2 보안성 분석)

  • Kim, Keon-Woo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.70-72
    • /
    • 2005
  • 최근들어 Radio Frequency Identification (RFID) 태그가 다수의 상품에 부착되고 절러 분야에 적용되기 시작했지만, 비용문제로 인해 인증이나 암호화 같은 보안기능은 고려하지 않고 있다. 보안 기능이 없는 RFID시스템은 개인정보 노굴, 불법 리더의 접근, 위조 태그의 남용과 같은 심각한 부작용을 초래하지만 현 단계에서는 보안기능을 적용하기가 쉽지않다. 절러 기술을 따르는 수동형 태그중 EPCglobal의 EPC Class 1과 Class 1 Generation 2(C1G2)는 산업계의 여러 분야에서 특히, supply-chain 모델에서 사실상 국제표준으로 여겨진다. EPC Class1 수준의 태그는 자체 밧데리를 가지지 않는 수동형 태그이고, 암호 프리미티브를 적용한 알고리즘이나 프로토콜은 제공하지 않는다. EPC Class1 과 EPC C1G2의 유일한 보안 대책으로는 태그를 영원히 동작하지 못하게 하는 Kill 기능이 있다. Kill을 수행한 태그는 RFID 태그로서의 의미가 사라진다. 본 논문에서는 Kill 기능에 대한 EPC Class1 시스템의 취약성을 보이고 또한, EPC C1G2 시스템에서 Kill 관점에서의 보안성을 분석한다.

  • PDF

Personal Privacy Protection Agent for RFID Users (RFID 사용자를 위한 개인 프라이버시 보호 에이전트)

  • Kim Soo-Cheol;Yeo Sang-Soo;Kim Sung Kwon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.58-60
    • /
    • 2005
  • 본 논문에서는 RFID 프라이버시 보호를 위한 개인 모바일 장치에 대해 제안한다. 현재까지 제안되었던 보안 기법들은 태그와 리더 사이의 암호학적 기법에 중점을 두었다. 제안하는 프라이버시 보호 에이전트는 다른 논문과는 달리 특별한 모바일 기기를 사용하여 높은 수준의 보안을 제공한다. 에이전트에 등록된 태그가 자신의 정보를 보안 에이전트에 위임하여 태그의 역할을 대신하게 하는 방식을 사용한다. 에이전트는 접근하는 리더를 인증하고 자신이 관리하는 태그 정보들을 선별하여 높은 수준의 암호화 처리 후 안전하게 통신한다. 태그는 해쉬만 가능하면 위변조문제까지 막을 수 있으므로 현재 RFID 시스템의 큰 변경없이 에이전트가 도입 가능하며 RFID 프라이버시 보호 문제를 해결 할 수 있을 것이라 기대된다.

  • PDF

A Design and Implementation of Genuine Quotation System of Black Pigs Using UHF RFID (UHF RFID를 활용한 흑돼지 진품인증시스템 설계 및 구현)

  • Ko, Seok-Yong;Kim, Hyu-Chan;Kim, Hyung-Soo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.2
    • /
    • pp.93-100
    • /
    • 2008
  • After free trade, it is increasing to import crops, aquatic products, and livestock which are produce in a foreign land. But it is affect negatively to trust relationships and markets of Jeju's foods because of breaking it out that foreign productions exchange domestic. Therefore, this paper designed and implemented the Genuine Quotation system of Black pigs using UHF RFID. This system is developed for distinguishing spuriousness, then searching information of the product through EPC ONS in EPCIS to print within a screen. Moreover, this intuitional and efficient system is constructed by connecting various sensors and lights. It can be contributed income increase thorough the security for the quality authority of the agricultural & stockbreeding products with FCS, FCG Certificate and the genuine certificate of the black pig which is the one of most typical agricultural & stockbreeding products in the pure Green Province, Jeju.

Implementation of Intelligent Home Network System using Wireless Sensor (무선센서를 이용한 지능형 홈네트워크 시스템 구현)

  • Ju, Jae-han;Na, Seung-kwon
    • Journal of Advanced Navigation Technology
    • /
    • v.21 no.3
    • /
    • pp.294-299
    • /
    • 2017
  • Home network service is evolving into a service that can receive contents such as remote education, home automation, remote meter reading and various entertainment anytime and anywhere by connecting all household appliances in home with wired and wireless network. In this paper, an intelligent home gateway installed at home is connected to the mobile communication terminal from the outside to solve the problems of the existing home network and configure and maintain a more efficient and comfortable home network environment for the user, In the window, the login page is activated to confirm the user access authority, and the user proceeds the authentication procedure through own login information. When the normal authentication procedure is performed, the intelligent home gateway maintains only the network connection with the user, and the user presents the intelligent home network system using the RFID which is accessed by the intelligent home network system.

A Study of Evaluation Certification on Electronic Power u-IT Convergence Equipment (전력 u-IT 융복합화 기기의 평가와 인증 연구)

  • Yi, Jeong-Hoon;Park, Dea-Woo;Kim, Eung-Sik;Kim, Hong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.11
    • /
    • pp.2433-2440
    • /
    • 2009
  • Whole system and network for supply of electric power and electricity safety are essential element. Electricity safety technology need rating for product and research about certification as product development that is done electric power u-IT cotton flannel mixed with development of u-IT, u-City base technology consists. Study on serve to develop electricity safety integration supervision system to apply product to u-City electric power appliance and cotton flannel mixed of u-IT appliance, Connection badness sensing instrument made device built-in electric power u-IT cotton flannel mixed in outlet that is used most in electric power appliance terminal. Using sensor on ZigBee, RFID performance estimation of communication module about function of product for remote safety check of electricity safety integration supervision system. A performance experiment and estimation in electric leakage, high voltage, Arc, fire detection diagnosis system and certification KS, electricity safety about product that get fitness finding.

A Study of Evaluation Certification on Electronic Power u-IT Convergence Equipment (전력 u-IT 융복합화 기기의 평가와 인증 연구)

  • Yi, Jeong-Hoon;Park, Dea-Woo;Bae, Suk-Myong;Kim, Eung-Sik;Kim, Hong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.499-502
    • /
    • 2009
  • Supply of electric power and electricity safety for whole system and network are essential element. Electricity safety technology need rating for product and research about certification as product development that is done cotton flannel mixed with development of u-IT technology consists. Study on serve to develop electricity safety integration supervision system to apply product to u-City electric power appliance and cotton flannel mixed of u-IT appliance, Connection badness sensing instrument made device built-in electric power IT cotton flannel mixed in outlet that is used most in electric power appliance terminal. Using sensor on ZigBee, RFID performance estimation of communication and module for remote safety check of electricity safety integration supervision system. A performance experiment and estimation in PD, Arc detection diagnosis system and certification KS, electricity safety about product that get fitness finding.

  • PDF